Bloomberg
What Have We Learned From Sonys Hack Attack?
Dec. 19 -- Bloomberg's Mia Saini reports on lessons learned from Sonys hack attack. She speaks on In The Loop. (Source: Bloomberg)
Bloomberg
The Top Three Stocks to Watch in Asia Today
Dec. 18 -- In todays Stock Exchange, Bloomberg's Yvonne Man, Shery Ahn and David Ingles discuss todays top three stocks to watch in Asia on First Up. (Source: Bloomberg)
Bloomberg
Details of Facebook, Snapchat Talks Exposed in Sony Hack
Dec. 17 -- Bloomberg's Sarah Frier reports on further details emanating from the cyber attack on Sony. She speaks on Bloomberg West. (Source: Bloomberg)
Bloomberg
Sony Cancels Release of 'The Interview
Dec. 18 -- Sony Pictures has cancelled its Christmas Day release of he movie The Interview just two days after a hacker threatened 9/11 violence on theaters that showed the film. Bloomberg's Yvonne Man reports on First Up. (Source:...
Bloomberg
JPMorgan Data Breach: What Information Was Taken?
Oct. 3 -- Bloomberg's Hans Nichols examines the type of information exposed in the latest data breach at JPMorgan, which affected 76 million households. He speaks on The Pulse.
Bloomberg
How Many Dairy Queens Were Breached by Hackers?
Oct. 10 -- On BWest Byte, Cory Johnson reports on the 395 International Dairy Queens that had customer data compromised by hackers. He speaks on Bloomberg West. (Source: Bloomberg)
Federal Trade Commission
On Guard Online: Protect Your Computer From Malware
Learn about malware effects on your computer with this short video. Understand how to avoid, identify and get rid of malicious software. The video is accompanied by a transcript and can be downloaded as well. [3:47]
Other
It Conversations: Future Proofing Your Privacy
This podcast addresses the issue of protecting your privacy today with threats from identity theft, malware, government surveillance, and consumer profiling. Marc Hedlund speaks about how can we best protect our future selves from the...
Other
Linked in Learning: Lynda: Types of Malware
This video (3:36) discusses the different types of malware, unwanted and malicious software, from the course: Ethical Hacking: The Complete Malware Analysis Process. The transcript is also provided.
Khan Academy
Khan Academy: What I Do
What are the responsibilities of an information security and forensics analyst? Ramel, an analyst at CI Security, shares the value of learning from his coworkers and working in a flexible environment that allows him to explore different...
PBS
Pbs: Nova Science Now: Luis Von Ahn: Computer Scientist
In this video meet Luis von Ahn, a computer scientist and a professor at Carnegie Mellon who had a most successful idea-CAPTCHA-a test that humans can pass but computers cannot, which has been used to improve the security of Internet...
Science Friday Initiative
Science Friday: Cyber Warfare
With the Stuxnet worm still affecting industrial systems around the world, some analysts are saying that the code may have been produced by a government. We'll talk about cyber warfare and computer security.
Science Friday Initiative
Science Friday: Cyber Attacks May Be Acts of War
Ira Flatow and guests discuss cyber attacks and the challenges in defining the nature of cyber warfare.
Science Friday Initiative
Science Friday: Is China"s Military Behind Cyberattacks on u.s.?
A new report links cyberespionage attacks on the U.S. to a unit of the Chinese military.